Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork

0
Medium
VulnerabilityCVE-2025-7684cvecve-2025-7684cwe-352
Published: Sat Aug 16 2025 (08/16/2025, 03:38:48 UTC)
Source: CVE Database V5
Vendor/Project: remysharp
Product: Last.fm Recent Album Artwork

Description

The Last.fm Recent Album Artwork plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.2. This is due to missing or incorrect nonce validation on the 'lastfm_albums_artwork.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:27:41 UTC

Technical Analysis

CVE-2025-7684 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Last.fm Recent Album Artwork plugin for WordPress, versions up to and including 1.0.2. The vulnerability stems from missing or incorrect nonce validation on the 'lastfm_albums_artwork.php' page, which is responsible for handling plugin settings updates. Nonces are security tokens used in WordPress to verify that requests originate from legitimate users and not from forged sources. Without proper nonce validation, attackers can craft malicious web requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), cause unauthorized changes to plugin settings or inject malicious scripts into the site. This attack vector does not require the attacker to be authenticated but does require user interaction from an administrator, making social engineering a key component. The vulnerability impacts the confidentiality and integrity of the affected WordPress site by enabling unauthorized configuration changes and potential script injection, though it does not affect availability. The CVSS 3.1 score of 6.1 reflects the network attack vector, low attack complexity, no privileges required, required user interaction, and a scope change due to potential impact beyond the vulnerable component. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in mid-July 2025 and published in August 2025 by Wordfence, a reputable security source. Organizations using this plugin should be aware of the risk and implement mitigations promptly.

Potential Impact

The impact of CVE-2025-7684 can be significant for organizations running WordPress sites with the Last.fm Recent Album Artwork plugin. Successful exploitation allows attackers to modify plugin settings without authorization, potentially injecting malicious scripts that could lead to further compromise such as cross-site scripting (XSS), session hijacking, or redirecting users to malicious sites. This undermines the confidentiality and integrity of the website and its users' data. While availability is not directly affected, the injected scripts or altered settings could degrade user trust and site reputation. Since the attack requires tricking an administrator into clicking a link, organizations with less security awareness or inadequate user training are at higher risk. The vulnerability could be leveraged as a foothold for more extensive attacks on the web infrastructure or to distribute malware. Given WordPress's widespread use globally, the threat has a broad potential impact, especially on sites that rely on this plugin and do not have compensating controls.

Mitigation Recommendations

To mitigate CVE-2025-7684, organizations should first check for updates or patches from the plugin vendor and apply them immediately once available. In the absence of an official patch, administrators should consider disabling or uninstalling the Last.fm Recent Album Artwork plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin's endpoints can provide temporary protection. Administrators should also enforce strict user access controls and minimize the number of users with administrative privileges. Educating administrators about the risks of clicking untrusted links and employing browser security features that warn about CSRF risks can reduce successful exploitation likelihood. Additionally, site owners can implement custom nonce validation or security plugins that enforce nonce checks on all plugin actions. Regular security audits and monitoring for unusual configuration changes or injected scripts can help detect exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-15T18:48:20.341Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689fff64ad5a09ad007439b4

Added to database: 8/16/2025, 3:47:48 AM

Last enriched: 2/26/2026, 4:27:41 PM

Last updated: 3/26/2026, 10:06:05 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses